SOURCE: ISC8, Inc.

ISC8, Inc.

September 16, 2013 11:15 ET

ISC8 Announces Cybersecurity SDN Strategy and Integration With Juniper Networks Contrail

Participation in SDN Technology Partner Program Will Help Add Critical Security Features to SDN Deployments

COSTA MESA, CA--(Marketwired - Sep 16, 2013) - ISC8® Inc. (OTCBB: ISCI), ("ISC8" or the "Company"), a provider of intelligent cybersecurity solutions, today announced that it has joined Juniper Networks SDN Technology Partner Program. As part of the program, ISC8 will integrate its cybersecurity portfolio with Juniper Networks Contrail, a standards-based and highly scalable network virtualization and intelligence solution for Software Defined Networking (SDN).

Contrail speeds the development and deployment of virtualized network and security services like ISC8's Cyber adAPT® by automating traffic routing through service chains and offering dynamic operation and control over the network and its service chains through Application Programming Interfaces (APIs).

"Integrating ISC8's cybersecurity products into Contrail will help service providers dramatically speed up the deployment of virtualized networks and customized security services while also ensuring that those deployments are secure against the most advanced and sophisticated threats," said Bill Joll, president and CEO of ISC8. "As a Juniper Networks SDN Technology Partner, we look forward to helping customers keep their valuable network investments one step ahead of the always evolving security threat landscape."

"Juniper Networks is pleased to be working with ISC8 to integrate its cybersecurity solutions into the Juniper Networks Contrail platform," Aruna Ravichandran, vice president, marketing and strategy, Software Solutions Division at Juniper Networks. "ISC8's cybersecurity solution, integrated with Contrail's simple and open platform will allow customers to quickly and easily deploy security services across the network."

About ISC8

ISC8 is actively engaged in the development and sale of intelligent cybersecurity solutions for commercial and government environments worldwide. ISC8's Cyber products are aimed at detecting next-generation malware and Advanced Persistent Threats (APTs) providing real-time Big Data security analytics to identify perpetrators, and the prevention of critical data loss. ISC8 provides hardware, software and service offerings for Malware Threat Detection. ISC8 is a global company with resources in Europe, Middle East, and Asia Pacific. For more information about ISC8 visit www.isc8.com.

ISC8 Safe Harbor Statement Under the Private Securities Litigation Reform Act

This release may contain information about future expectations, plans and prospects of ISC8's management that constitute forward-looking statements for purposes of the safe harbor provisions under the Private Securities Litigation Reform Act of 1995. Actual results may differ materially from those indicated by these forward-looking statements as a result of various important factors including, but not limited to, competitive forces, general economic, market or business conditions, the effects of any attempts to intentionally disrupt our services or network by hackers or others, changes in ISC8's technologies such that they are no longer inter-operable, failure of customers to adopt, or delays in their adoption of, ISC8 products or services discussed above, and other factors, most of which are beyond ISC8's control, as well as those discussed in the Company's Annual Report on Form 10-K, quarterly reports on Form 10-Q, and other documents periodically filed with the SEC. Except as required by law, we undertake no obligation to revise or update publicly any forward-looking statements for any reason.

Disclaimer
This document is provided for informational purposes only. The information contained in this document represents the current view of Juniper Networks as of the date of publication. Because Juniper Networks must respond to changes in market conditions, it should not be interpreted to be a commitment on the part of Juniper Networks, and Juniper Networks cannot guarantee the accuracy of any information after the date of publication. Juniper Networks reserves the right to select and limit the number of partners for use in press releases, related documents and activities.

Contact Information